Description: A malicious actor can see the wordpress config details and can also extract DB_NAME , DB_USERNAME and DB_PASSWORD
Severity: High
Shodan/Censys Dork: wordpress
How to Run: echo "target"| httpx --silent | nuclei -t wordpress=config.yaml